Behavioral task
behavioral1
Sample
52bd218288f05ac62e7982f335038bdc9e91070cc7c56e50a9a791d8e6907676.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
52bd218288f05ac62e7982f335038bdc9e91070cc7c56e50a9a791d8e6907676.exe
Resource
win10v2004-20220812-en
General
-
Target
52bd218288f05ac62e7982f335038bdc9e91070cc7c56e50a9a791d8e6907676
-
Size
35KB
-
MD5
b9dde93f0ed064ffd1a294974954b916
-
SHA1
964b1cd75cb33e4bef48464860e766a46618e63b
-
SHA256
52bd218288f05ac62e7982f335038bdc9e91070cc7c56e50a9a791d8e6907676
-
SHA512
30d42a4b28b0f7997dbb1d7ab1012e00099a24ca204482a4177a5ee75f853ba904f56f783f5ecb21bd8f794ba6df35ac97827fad21966a80f2940303f55f55eb
-
SSDEEP
384:vVUvhOgCI5iRQ6GSwRk7BBpwl+owxxfIEdiI+Nyl2gdUJZRWdh0ak8pr4PY8Hs6X:+iRKvCNBuEfLv+NylYA1k8+PY8Hs6ZI
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
52bd218288f05ac62e7982f335038bdc9e91070cc7c56e50a9a791d8e6907676.exe windows x86
87bed5a7cba00c7e1f4015f1bdae2183
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetProcAddress
Sections
UPX0 Size: 14KB - Virtual size: 28KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 5KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DAStub Size: 2KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DAStub Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE